Metrics

  • citations in SCIndeks: [1]
  • citations in CrossRef:0
  • citations in Google Scholar:[]
  • visits in previous 30 days:18
  • full-text downloads in 30 days:12

Contents

article: 1 from 8  
Back back to result list
2021, vol. 18, iss. 2, pp. 223-232
Hacker attacks as a form of syber terrorism
Megatrend University, Faculty of Law, Public Administration and Security, Belgrade

emailsanja_klisaric@yahoo.com
Project:
Ovaj rad je rezultat projekta FPMIRS - Znanjem do integrisanja u društvene i ekonomske tokove. Projekat je pokrenut sporazumom Pravnog fakulteta sa Međunarodnim institutom za romološke studije

Abstract
As we are referred intensively and inevitably to all the contents that are important to us on the Internet, the number of hacker attacks is by the logic of things, more and more frequent. This phenomenon warns that all state security systems are under constant threat from cyber terrorism. This paper analyzez the hacker attack as a phenomenon, as a consequence and cause, but also as an instrument of cyber terrorism. The purpose of this paper is to point out those elements of this type of terrorism that are not adequately represented, and thus not recognized in a way that should be taken seriously and opposed. The paper presents observations that aim to point out the way in which hacker attacks could be suppressed and intercepted.
References
*** The 9/11 commission report: Final report of the National Commission on terrorist attacks upon the United States
Ackerman, R.K. (1999) Security agency transformations from backer to participant. Signal, note 152; (October)
Hamied, B.A. (2006) Jihadis adapt to counter terror measures and create new intelligence manuals. Terrorism Monitor, 4(14):1-2; (july 13)
Hollywood, J., Snyder, D., McKay, K., Boon, J. (2004) Out of the ordinary: Finding hidden threats by analyzing unusual behavior. Santa Monica, CA: RAND Corporation, 23-23
Klisarić, S. (2019) Žene teroristi u periodu od 1979.godine do 2016. godine. Doktorska disertacija
Levy, S. (1984) Hackers: Heroes of the computer revolution Garden City. New York
Peter, R., Trim, J. (2003) Public and private sector cooperation in counteracting cyberterrorism. International Journal of Intelligence and Counterintelligence, 16: 594-608
States (2004) 9/11 Report. p. 88; https://www.govinfo.gov/app/details/GPO-911REPORT
Tiboni, F. (2000) Difficulty grows for US intelligence gatherin. Space News, p.1; (12 June)
Weinmman, G. (2004) How modern terrorism uses the Internet. USIP Special Report, 116: 3
Winston, T. (2007) Intelligence challenges in tracking terrorist Internet fund transfer activities. International Journal of Intelligence and CounterIntelligence, 20(2): 327-343
 

About

article language: Serbian
document type: Professional Paper
DOI: 10.5937/MegRev2102223K
received: 16/04/2021
accepted: 21/04/2021
published in SCIndeks: 10/12/2021
Creative Commons License 4.0

Related records

No related records